تعديل

‏إظهار الرسائل ذات التسميات هاك. إظهار كافة الرسائل
‏إظهار الرسائل ذات التسميات هاك. إظهار كافة الرسائل

الخميس، 9 مارس 2017

اعرف ما هو الهاكر

بسم الله الرحمن الرحيم

السلام عليكم ورحمه الله وبركاته

What is the Hack?

Hack's HHVM is a programming language. Hack reconcile rapid development cycle for dynamically typed language with the discipline offered by fixed-writing, while adding many of the features typically found in languages ​​other modern programming.

Hack provides instantaneous type of verification by checking gradually your files as you edit. Usually it runs in less than 200 milliseconds, making it easy to integrate into your development work without introducing a noticeable delay.

Here are some of the important features of the language of the Hack. For more information, see the full documentation, or follow through fast and interactive tutorial.

Type annotations

Allow the type annotations to code because explicitly written on the parameters and variables are a class member and return values.



1
2
3
4
5
6
7
8
9
<?hh
class MyClass {
  const int MyConst = 0;
  private string $x = '';
  public function increment(int $x): int {
    $y = $x + 1;
    return $y;
  }
}


pharmaceutical

Medicines allow classes and methods that parameters (any kind associated when it is instantiated class or method call) in the same vein as the fixed type languages such as C # and Java).
1
2
3
4
5
6
7
8
9
10
11
12
<?hh
class Box<T> {
  protected T $data;

  public function __construct(T $data) {
    $this->data = $data;
  }

  public function getData(): T {
    return $this->data;
  }
}

Nullable types




And it supports nullable types by Hack through the use? The operator or agent. This provides a safer way to deal with the free and very useful values ​​of primitive types that do not usually allow null and one of the values, such as logical and int (using? Logical and? Int, respectively). The operator can be used in any type or category.


Groups




Offering groups of first-class, built-in types of parameters such as vectors (l, based on the index ordered), Map (Lexicon ordered), group (a list of unique values), and a pair (a group based on the index exactly two elements).


Lambdas




Lambdas allow briefly defined functions of the first class.

1
2
3
4
5
6
7
8
9
<?hh
function foo(): (function(string): string) {
  $x = 'bar';
  return $y ==> $x . $y;
}
function test(): void {
  $fn = foo();
  echo $fn('baz'); // barbaz
}

Other Features




Other important features include the Hack XHP, shapes, zig-zag type, support for synchronization, compatibility with PHP code, and much more.


We are delighted to have both paid and converting open source tools you can use on your source program. We are keen to continue to work on this project: We would love to have your response to our work so far, and I welcome you all to participate in the communities HHVM and Hack.

الخميس، 23 فبراير 2017

الرئيس دونالد ترامب موقع الويب الخاص اخترق؛ تشويه العراقية هاكر

In the name of of Allah the Merciful
Peace, mercy and blessings of God




During the presidential campaign in 2016, he reported about how safe the e which is run by the Trump Organization's service to anyone with a little knowledge of computers can almost everything presents for Trump and his campaign.

Now, some unknown hackers calling itself "Pro_Mast3r" was able to distort the official website associated with fundraising presidential campaign President Donald Trump on Sunday.


Pirates, who claim to be from Iraq, said server distortion, secure2.donaldjtrump.com behind the content management system in the CloudFlare platform security.

Server appears to be the official campaign Trump server, according to Ars, and the server certificate is legitimate, "but said, referring to a picture on another site is not secure, which led to a warning on Chrome and Firefox that connection is not secure."

Distortion display an image of a black man hat site included a text message, which reads:

Infiltrated by Pro_Mast3r ~
E-government striker
Nothing is impossible
Peace in Iraq


At the time of writing this report, the server is now offline, there is no official statement from the Trump penny campaign team yet.

According to the latest Ndwinh President Donald Trump's website hacked; Iraqi distortion hacker published by journalist Paolo Attivissimo technology that, does not contain the source code of any software distortion malicious script server.

Instead, it includes a server up to JavaScript on the now non-existent account Google blog, "masterendi", which was linked to cyber attacks on three other sites in the past.





Source 

السبت، 18 فبراير 2017

قراصنة تستخدم الروبوت البرمجيات الخبيثة للتجسس على الأفراد العسكريين الصهاينه

بسم الله الرحمن الرحيم


السلام عليكم ورحمه الله وبركاته



A group of highly sophisticated hackers state-sponsored spying on the Israeli army by hacking the personal Android phones for soldiers to control the activities of individuals, and data theft.



المعرفه
The newly released search by Kuyt and Kaspersky suggests that believed more than 100 Israeli soldiers from the Israel Defense Forces (IDF) to targeted with spyware.

Called ViperRAT name, and has been specifically designed malware to kidnap Israeli soldiers smartphone "Android-based and after exfiltrate valuable data, including images and audio recordings, directly from the risk devices.
Mode of action have been identified
According to security companies, and members of the Israel Defense Forces has been breached by social engineering techniques - where he was luring soldiers through Facebook Messenger and other social networks to enter the communications with the hackers who were on the attractiveness of various countries such as Canada, Germany, Switzerland and women.
Then the soldiers were tricked to install a version trojanized two different, usually legitimate Android apps chat, chat and Real YeeCall Pro, to facilitate communication.
As it has been the distribution of malware using the dropper hidden in the smart phone applications and other Android including billiards game, the player Israeli love songs, and transfer to the application IOS, which is shared between Israeli citizens and available in the Google Play store.

The application then scanned soldiers smart phones and downloading malicious applications that masqueraded as an update to last a pre-installed applications, such as WhatsApp, and deceive the victims to allow different permissions to carry out surveillance.
This, in turn, allows an attacker to execute commands on demand, enabling them to control the phone's microphone, camera, and eavesdrop on conversations soldiers, peers in the footage live cams.
In addition to this, malicious ViperRAT software combines a wide range of data from computers at risk including geolocation, Call Log, personal photographs and text messages, cell phone tower information, and network and metadata device, surf the Internet, download the application date.


May God have benefited
And I hope I have I could deliver information to you

Do not forget to leave your comment if you get stuck
Also do not forget the wonders because these small pressure equal to a great encouragement for me


I hope to post Thread friends also benefit
Do not forget Likes page
To receive the all-new





مدونه المعرفه للمعلومات




Learn anything you want by YouTube (ethical hacker courses, courses in programming, courses, photoshop ...... ......

بسم الله الرحمن الرحيم
السلام عليكم ورحمه الله وبركاته

Learning is now easier than ever before, you can learn everything you want for free and without leaving home by YouTube, blogs and can be accessed very easily by search engines all you have to do is book you want to teach
This is a favorite among many young people if not all of them.
In order to easier and easier for you, dear reader, I will introduce you range of courses that you can learn from them

المعرفه


His role in the ethical hacker provided by the Association Hereafter
Provided by the engineer Waleed Sami started
هناYou can if you want to learn from entry 

Courses in programming:

دورة في لغة الHTML 



Networking sessions and information technology:
دورة في شهادة MCITP




You do not have an excuse now education came at home
I wish you success and God abound note.


I ask God to have benefited
And I hope that I have I could deliver information to you

Do not forget to leave your comment if you get stuck
Also do not forget the wonders because these small pressure equal to a great encouragement for me


I hope to post Thread friends also benefit
Do not forget Likes page
To receive the all-new



مدونه المعرفه للمعلومات


السبت، 11 فبراير 2017

مجموعة أنونيموس تطرح طريقة اختراق هاتف دونالد ترامب

بسم الله الرحمان الرحيم


السلام عليكم ورحمه الله وبركاته

نشرت مجموعه الانونيموس في مواقعها الرسميه أنه استطاع مجموعه من عملائها الصغار أختراق هاتف الرئيس الأمريكي دونالد ترامب بسبب الحرب الذي شنها ضد العديد من المهاجرين من مختلف بقاع العالم كما أنهم شاركواهذه  الطريقة في شبكة الأنترنت.



anonymous

وحسب مصادر أنونيموس الرسمية فإن الطريقة في الأصل تعتمد على معرفة رقم الضحية والذي يعتبر من أسهل الأمور بالنسبة للمجموعة 
 وأطلقت الانونيموس على هذه  اسم stagefright وأكدت أن الطريقه سهله حيث أن كل ما عليك فعله هو ارسال رساله MMS   فسيجد بها ملف امتداد mp4 والذي يجعله يعتقد أنه فيديو .
بمجرد فتحه يصل إليه الانونيموس, وإليك هذا الفيديو لتعرف أكثر عن طريقه استخدامه.




أرجو أن تكون قد أستفدت 
و أرجو أن أكون قد أستطعت توصيل المعلومه إليك

لاتنسى ترك تعليقك إذا واجهتك مشكله
أيضا لا تنسى الأعجاب لأن هذه الضغطه الصغيره تساوي تشجيعا كبيرا بالنسبه لي


أرجو مشاركه الموضوع كي يستفيد أصدقائك أيضا
لا تنسى الاعجاب بالصفحه
لكي يصلك كل جديد




مدونه المعرفه للمعلومات

Twitter Delicious Facebook Digg Stumbleupon Favorites More